How To Not Be A Victim Of Ransomware The thoughtful integration of - - PowerPoint PPT Presentation

how to not be a victim of ransomware
SMART_READER_LITE
LIVE PREVIEW

How To Not Be A Victim Of Ransomware The thoughtful integration of - - PowerPoint PPT Presentation

How To Not Be A Victim Of Ransomware The thoughtful integration of healthcare and technology How Healthcare IT Differs From General IT Agenda The Growing Threat of Ransomware What You Can Do Today To Protect Your Business How Healthcare IT


slide-1
SLIDE 1

The thoughtful integration of healthcare and technology

How To Not Be A Victim Of Ransomware

slide-2
SLIDE 2
slide-3
SLIDE 3
slide-4
SLIDE 4

Agenda

How Healthcare IT Differs From General IT The Growing Threat of Ransomware What You Can Do Today To Protect Your Business

slide-5
SLIDE 5
slide-6
SLIDE 6
slide-7
SLIDE 7

How Healthcare IT Differs From General IT

  • Mobile Providers
  • Labor Intensive + Technology Dependent
  • ePHI: Top Target For Cyber Criminals
  • Heavily Regulated
  • Over 40% of breaches caused by

Business Associates

slide-8
SLIDE 8

The Growing Threat of Ransomware

slide-9
SLIDE 9
slide-10
SLIDE 10

Cybersecurity threats

Ransomware’s Growing Threat to Small Businesses

The Ponemon Institute reported that:

  • f SMBs were victims of a

cybersecurity attack in 2016. Data breach costs now averages per healthcare record.

The Wall Street Journal, reported that:

  • f ransomware victims pay to

regain their data.

were not able to fully restore their company’s computer data.

slide-11
SLIDE 11

LESS THAN 1 IN 3 ATTACKS ARE REPORTED TO THE AUTHORITIES,

A MARKED IMPROVEMENT FROM 1 IN 4 ATTACKS REPORTED IN 2016.

MORE RANSOMWARE ATTACKSREPORTED TO AUTHORITIES BYSMBs

slide-12
SLIDE 12

The bad actors are not a monolithic group

Tools, techniques, motivations, and business models vary by cybercriminal region

Non-Professional

  • Non-professional

cybercriminals

  • Use crime kits to make

spendingmoney

  • Little to no business or

technical expertise

  • Even though they are not

professional, their impact can be significant

Blackhats

  • Treat cybercrime as a

business

  • Business and technical

expertise

  • Often work in a closed group
  • f other professional

cybercriminals

  • Criminal reputation is

everything

Grayhats

  • They believe they are
  • ffering legitimate services.

However, their customers can be both “legitimate” or criminal

  • Ran as a business

Hactivists

  • Individuals or groups who

hack for a social cause, without economic motivation

  • Have both technical

people and followers

State Sponsored

  • National security and/or

economic motivation

  • Technical expertise
  • Work in a closed group of
  • ther professionals
  • Often use Blackhatresources

and/or techniques to mask their identity

Often defenders treat all bad actors the same

slide-13
SLIDE 13

Cybercrime as a Service (CaaS)

It has never been easier for new entrants into the market Example of crimekits and services

slide-14
SLIDE 14

“Everything that was lost is gone,” the chief said. “Our automatic backup started after the infection, so it just backed up infected files.”

slide-15
SLIDE 15
slide-16
SLIDE 16
slide-17
SLIDE 17

Kentucky Methodist Hospital, Chino Valley Medical Center Desert Valley Hospital, California, Hollywood Presbyterian Medical Center MedStar Health, Maryland/Washington, DC

slide-18
SLIDE 18

Sample Spear Phishing Attack

slide-19
SLIDE 19
slide-20
SLIDE 20

Cybercrime Crosses Into The Physical World

  • Social engineering is being combined with cyber

attacks to increase effectiveness.

  • In many regions, it is becoming socially

acceptable to steal from victims on the Internet

and scales down to Small Businesses and Consumers

slide-21
SLIDE 21

TOTAL RANSOM PAID BYSMBs TO RANSOMWARE HACKERS*:

$301 MILLION.

$100-500 $501-2,000 $2,001-5,000 5,001-10,000 $10,001-15,000 $15,001-20,000 $20,001+

25% 17% 7%

47%

report the ransom requested is TYPICALLY between $500 AND $2,000.

*Between Q2 2016 and Q2 2017

FOR SMBs…THE RANSOM ISN’T WHAT BREAKS THE BANK

Q: If ransom was requested, how much (on average)? 2% 1% 1%

slide-22
SLIDE 22

OF THOSE THAT PAID THE RANSOM,

15% NEVER

RECOVERED THE DATA.

2016: 2017:

41% 35%

GEO TREND: In the UK alone, 21% of SMBs who paid the ransom never recovered the data.

LESS SMBsARE PAYING CYBER CRIMINALS THE RANSOM

IN 2017,

35% REPORT

SMBs PAID THE RANSOM,

WHICH IS SIGNIFICANTLY LESS THAN IN 2016.

slide-23
SLIDE 23
slide-24
SLIDE 24

How much did it cost…

They did NOT pay the $73k in ransom because they had proper backups However….They did NOT have a continuity solution

  • Down 2 days (Friday & Saturday)
  • 735,000 rides a day offered for free
  • $2.25 per ride

Lost $3.3 million

slide-25
SLIDE 25
slide-26
SLIDE 26

What You Can Do Today To Protect Your Business

slide-27
SLIDE 27

25 Most Common Passwords of Last Year

#1 -> 123456 #6 -> 1234567890 #11 -> qwertyuiop #16 -> 7777777 #21 -> google #2 -> 123456789 #7 -> 1234567 #12 -> mynoob #17 -> 1q2w3e4r #22 -> 1q2w3e4r5t #3 -> qwerty #8 -> password #13 -> 123321 #18 -> 654321 #23 -> 123qwe #4 -> 12345678 #9 -> 123123 #14 -> 666666 #19 -> 555555 #24 -> zxcvbnm #5 -> 111111 #10 -> 987654321 #15 -> 18atcskd2w #20 -> 3rjs1la7qe #25 -> 1q2w3e

slide-28
SLIDE 28

15 Ways To Protect Your Business Guide

slide-29
SLIDE 29
slide-30
SLIDE 30

Next Steps

  • 1. Versioned Offsite Backup
  • 2. Train Your Staff
  • 3. Get Advanced Email Threat Protection
slide-31
SLIDE 31

Free $1,500 Ransomware Protection Program 30% Off Our Risk Analysis 15 Ways To Protect Your Business from Ransomware US Medical IT Health IT Check

Do you have onsite data that is either not being backed up or that may be getting backed up but with outdated technology? Microsoft Sponsorship: $1,500 Only 5 Slots Available

www.usmedicalit.com/protect

The Protecon Package

slide-32
SLIDE 32

Thank You

www.usmedicalit.com